]> git.cworth.org Git - notmuch/commitdiff
util: run uncrustify
authoruncrustify <david@tethera.net>
Sat, 13 Mar 2021 12:45:34 +0000 (08:45 -0400)
committerDavid Bremner <david@tethera.net>
Sat, 13 Mar 2021 12:45:34 +0000 (08:45 -0400)
This is the result of running

     $ uncrustify --replace --config ../devel/uncrustify.cfg *.c *.h

in the util directory

util/crypto.c
util/crypto.h
util/gmime-extra.c
util/repair.c
util/string-util.c
util/zlib-extra.c
util/zlib-extra.h

index c09f467b350b5d453e799d5b7941463544b411a0..156a6550c20afef00a6bb5eaab94e8ba435cbfbd 100644 (file)
@@ -48,7 +48,8 @@ _notmuch_crypto_decrypt (bool *attempted,
        notmuch_message_properties_t *list = NULL;
 
        for (list = notmuch_message_get_properties (message, "session-key", TRUE);
-            notmuch_message_properties_valid (list); notmuch_message_properties_move_to_next (list)) {
+            notmuch_message_properties_valid (list); notmuch_message_properties_move_to_next (
+                list)) {
            if (err && *err) {
                g_error_free (*err);
                *err = NULL;
@@ -61,12 +62,13 @@ _notmuch_crypto_decrypt (bool *attempted,
                                                          notmuch_message_properties_value (list),
                                                          decrypt_result, err);
            } else if (GMIME_IS_APPLICATION_PKCS7_MIME (part)) {
-               GMimeApplicationPkcs7Mime *pkcs7 = GMIME_APPLICATION_PKCS7_MIME (part);
+               GMimeApplicationPkcs7Mime *pkcs7 = GMIME_APPLICATION_PKCS7_MIME (part);
                GMimeSecureMimeType type = g_mime_application_pkcs7_mime_get_smime_type (pkcs7);
                if (type == GMIME_SECURE_MIME_TYPE_ENVELOPED_DATA) {
                    ret = g_mime_application_pkcs7_mime_decrypt (pkcs7,
                                                                 GMIME_DECRYPT_NONE,
-                                                                notmuch_message_properties_value (list),
+                                                                notmuch_message_properties_value (
+                                                                    list),
                                                                 decrypt_result, err);
                }
            }
@@ -90,6 +92,7 @@ _notmuch_crypto_decrypt (bool *attempted,
     if (attempted)
        *attempted = true;
     GMimeDecryptFlags flags = GMIME_DECRYPT_NONE;
+
     if (decrypt == NOTMUCH_DECRYPT_TRUE && decrypt_result)
        flags |= GMIME_DECRYPT_EXPORT_SESSION_KEY;
     if (GMIME_IS_MULTIPART_ENCRYPTED (part)) {
@@ -128,7 +131,8 @@ _notmuch_message_crypto_new (void *ctx)
 }
 
 notmuch_status_t
-_notmuch_message_crypto_potential_sig_list (_notmuch_message_crypto_t *msg_crypto, GMimeSignatureList *sigs)
+_notmuch_message_crypto_potential_sig_list (_notmuch_message_crypto_t *msg_crypto,
+                                           GMimeSignatureList *sigs)
 {
     if (! msg_crypto)
        return NOTMUCH_STATUS_NULL_POINTER;
@@ -157,7 +161,8 @@ _notmuch_message_crypto_potential_sig_list (_notmuch_message_crypto_t *msg_crypt
 
 
 bool
-_notmuch_message_crypto_potential_payload (_notmuch_message_crypto_t *msg_crypto, GMimeObject *part, GMimeObject *parent, int childnum)
+_notmuch_message_crypto_potential_payload (_notmuch_message_crypto_t *msg_crypto, GMimeObject *part,
+                                          GMimeObject *parent, int childnum)
 {
     const char *protected_headers = NULL;
     const char *forwarded = NULL;
@@ -175,7 +180,8 @@ _notmuch_message_crypto_potential_payload (_notmuch_message_crypto_t *msg_crypto
      * encryption protocol should be "control information" metadata,
      * not payload.  So we skip it. (see
      * https://tools.ietf.org/html/rfc1847#page-8) */
-    if (parent && GMIME_IS_MULTIPART_ENCRYPTED (parent) && childnum == GMIME_MULTIPART_ENCRYPTED_VERSION) {
+    if (parent && GMIME_IS_MULTIPART_ENCRYPTED (parent) && childnum ==
+       GMIME_MULTIPART_ENCRYPTED_VERSION) {
        const char *enc_type = g_mime_object_get_content_type_parameter (parent, "protocol");
        GMimeContentType *ct = g_mime_object_get_content_type (part);
        if (ct && enc_type) {
index 4fa5599c755cfedc8e27aaef4e59dc83df3bd997..3c5d384bf6dbd273782e269c6a163769ca4300e6 100644 (file)
@@ -80,7 +80,8 @@ _notmuch_message_crypto_new (void *ctx);
  * consider a particular signature as relevant for the message.
  */
 notmuch_status_t
-_notmuch_message_crypto_potential_sig_list (_notmuch_message_crypto_t *msg_crypto, GMimeSignatureList *sigs);
+_notmuch_message_crypto_potential_sig_list (_notmuch_message_crypto_t *msg_crypto,
+                                           GMimeSignatureList *sigs);
 
 /* call successful_decryption during a depth-first-search on a message
  * to indicate that a part was successfully decrypted.
@@ -95,7 +96,8 @@ _notmuch_message_crypto_successful_decryption (_notmuch_message_crypto_t *msg_cr
  * this message.
  */
 bool
-_notmuch_message_crypto_potential_payload (_notmuch_message_crypto_t *msg_crypto, GMimeObject *part, GMimeObject *parent, int childnum);
+_notmuch_message_crypto_potential_payload (_notmuch_message_crypto_t *msg_crypto, GMimeObject *part,
+                                          GMimeObject *parent, int childnum);
 
 
 #ifdef __cplusplus
index 04d8ed3d70a83b4b1bb7bab029f060227d2e3b70..81a5b1743b7bee88ff05277021a6195a20c85bff 100644 (file)
@@ -101,6 +101,7 @@ g_mime_certificate_get_valid_userid (GMimeCertificate *cert)
     if (uid == NULL)
        return uid;
     GMimeValidity validity = g_mime_certificate_get_id_validity (cert);
+
     if (validity == GMIME_VALIDITY_FULL || validity == GMIME_VALIDITY_ULTIMATE)
        return uid;
     return NULL;
index 5a64e001e72708ef1336c23b3f4593f19b576b46..5b0dfdf4a1853dc16e3168f0caf0916dcf223aca 100644 (file)
@@ -32,7 +32,8 @@ _notmuch_crypto_payload_has_legacy_display (GMimeObject *payload)
     if (! g_mime_content_type_is_type (g_mime_object_get_content_type (payload),
                                       "multipart", "mixed"))
        return false;
-    protected_header_parameter = g_mime_object_get_content_type_parameter (payload, "protected-headers");
+    protected_header_parameter = g_mime_object_get_content_type_parameter (payload,
+                                                                          "protected-headers");
     if ((! protected_header_parameter) || strcmp (protected_header_parameter, "v1"))
        return false;
     if (! GMIME_IS_MULTIPART (payload))
@@ -44,15 +45,16 @@ _notmuch_crypto_payload_has_legacy_display (GMimeObject *payload)
        return false;
     first = g_mime_multipart_get_part (mpayload, 0);
     /* Early implementations that generated "Legacy Display" parts used
-       Content-Type: text/rfc822-headers, but text/plain is more widely
-       rendered, so it is now the standard choice.  We accept either as a
-       Legacy Display part. */
+     * Content-Type: text/rfc822-headers, but text/plain is more widely
+     * rendered, so it is now the standard choice.  We accept either as a
+     * Legacy Display part. */
     if (! (g_mime_content_type_is_type (g_mime_object_get_content_type (first),
                                        "text", "plain") ||
           g_mime_content_type_is_type (g_mime_object_get_content_type (first),
                                        "text", "rfc822-headers")))
        return false;
-    protected_header_parameter = g_mime_object_get_content_type_parameter (first, "protected-headers");
+    protected_header_parameter = g_mime_object_get_content_type_parameter (first,
+                                                                          "protected-headers");
     if ((! protected_header_parameter) || strcmp (protected_header_parameter, "v1"))
        return false;
     if (! GMIME_IS_TEXT_PART (first))
@@ -77,7 +79,7 @@ static bool
 _notmuch_is_mixed_up_mangled (GMimeObject *part)
 {
     GMimeMultipart *mpart = NULL;
-    GMimeObject *parts[3] = {NULL, NULL, NULL};
+    GMimeObject *parts[3] = { NULL, NULL, NULL };
     GMimeContentType *type = NULL;
     char *prelude_string = NULL;
     bool prelude_is_empty;
index 27f8a26b4938c4c770486e504b62f168db64f582..9c46a81a58e20030b586953e577efd777ef2af17 100644 (file)
@@ -53,7 +53,7 @@ strsplit_len (const char *s, char delim, size_t *len)
        count++;
     }
 
-    if (count==0)
+    if (count == 0)
        return NULL;
 
     *len = count;
@@ -183,6 +183,7 @@ parse_boolean_term (void *ctx, const char *str,
     /* Parse prefix */
     str = skip_space (str);
     const char *pos = strchr (str, ':');
+
     if (! pos || pos == str)
        goto FAIL;
     *prefix_out = talloc_strndup (ctx, str, pos - str);
index 3a75e50434b92b4ca1dd7d2fffed14e26fde40b8..1f5f9dbeec012cfc0211914d369bc6748d9eb6bb 100644 (file)
@@ -87,8 +87,9 @@ gz_error_string (util_status_t status, gzFile file)
 }
 
 const char *
-gzerror_str(gzFile file)
+gzerror_str (gzFile file)
 {
     int dummy;
+
     return gzerror (file, &dummy);
 }
index e9925c985330073398c01b53dffcf0d6e6fc208d..7532339b0df2000d8a70472e2107ebbf47e1669c 100644 (file)
@@ -30,7 +30,7 @@ gz_error_string (util_status_t status, gzFile stream);
 /* Call gzerror with a dummy errno argument, the docs don't promise to
  * support the NULL case */
 const char *
-gzerror_str(gzFile file);
+gzerror_str (gzFile file);
 
 #ifdef __cplusplus
 }